Skip to main content

Showing 1–4 of 4 results for author: Korzhik, V

Searching in archive cs. Search in all archives.
.
  1. arXiv:1608.02291  [pdf, other

    cs.MM cs.IT

    Semi-Fragile Image Authentication based on CFD and 3-Bit Quantization

    Authors: Aleksey Zhuvikin, Valery Korzhik, Guillermo Morales-Luna

    Abstract: There is a great adventure of watermarking usage in the context of conventional authentication since it does not require additional storage space for supplementary metadata. However JPEG compression, being a conventional method to compress images, leads to exact authentication breaking. We discuss a semi-fragile watermarking system for digital images tolerant to JPEG/JPEG2000 compression. Recently… ▽ More

    Submitted 7 August, 2016; originally announced August 2016.

  2. arXiv:1101.3774  [pdf, other

    cs.IT

    Secret Key Agreement Over Multipath Channels Exploiting a Variable-Directional Antenna

    Authors: Valery Korzhik, Viktor Yakovlev, Guillermo Morales-Luna, Yuri Kovajkin

    Abstract: We develop an approach of key distribution protocol (KDP) proposed recently by T. Aono et al. A more general mathematical model based on the use of Variable-Directional Antenna (VDA) under the condition of multipath wave propagation is proposed. Statistical characteristics of VDA were investigated by simulation, that allows us to specify model parameters. The security of the considered KDP is esti… ▽ More

    Submitted 19 January, 2011; originally announced January 2011.

  3. arXiv:1005.3184  [pdf, other

    cs.IT

    Key Distribution Protocols Based on Extractors Under the Condition of Noisy Channels in the Presence of an Active Adversary

    Authors: Viktor Yakovlev, Valery Korzhik, Guillermo Morales-Luna, Mihail Bakaev

    Abstract: We consider in this paper the information-theoretic secure key distribution problem over main and wire-tap noise channels with a public discussion in presence of an active adversary. In contrast to the solution proposed by ourselves for a similar problem using hashing for privacy amplification, in the current paper we use a technique of extractors. We propose modified key distribution protocols… ▽ More

    Submitted 18 May, 2010; originally announced May 2010.

    MSC Class: 68U10

  4. arXiv:0808.2486  [pdf, other

    cs.IT cs.CR

    Wet Paper Coding for Watermarking of Binary Images

    Authors: Michail Zubarev, Valery Korzhik, Guillermo Morales-Luna

    Abstract: We propose a new method to embed data in binary images, including scanned text, figures, and signatures. Our method relies on the concept of wet paper codes. The shuffling before embedding is used in order to equalize irregular embedding capacity from diverse areas in the image. The hidden data can be extracted without the original binary image. We illustrate some examples of watermarked binary… ▽ More

    Submitted 18 August, 2008; originally announced August 2008.

    ACM Class: K.6.5